Limit search to available items
Book Cover
E-book
Author Weber, Stefan G

Title Multilaterally secure pervasive cooperation : privacy protection, accountability and secure communication for the age of pervasive computing / Stefan G. Weber
Published Amsterdam ; Washington, D.C. : IOS Press, ©2012

Copies

Description 1 online resource
Series Cryptology and information security series ; v. 9
Cryptology and information security series ; v. 9.
Contents Title Page; Preface; Contents; List of Figures; List of Tables; Introduction; Motivation; Object of Research; Goals and Research Questions; Approach and Scientific Contributions; Evaluation; Publications; Structure; Background and Requirements; What is Pervasive Computing?; Perspective; From Product Traceability ... ; .. to Human-Centric Pervasive Applications; Main Components of Pervasive Systems; Towards Pervasive Cooperation; Some Security Issues in Pervasive Computing; IT Security, Multilateral Security and Pervasive Systems; The Challenge of Securing a Pervasive System
Privacy and the Need for Privacy ProtectionPrivacy Protection versus Accountability; Reference Scenario: ICT-Supported Emergency Response; Introduction to Application Domain; Disaster Management Information Systems; Towards Location-Aware First Response; Protection Goals Motivated within Reference Scenario; One-to-Many Communication in Emergency Situations; Emergency Communication Patterns; Security Requirements for Emergency Communication; Privacy and Accountability Issues of Real-World Auditing; Application Examples within Reference Scenario
Security Requirements for Multilaterally Secure AuditingSummary; State of the Art; The Broader Context; Towards Multilaterally Secure Pervasive Auditing; Relevant Properties of Digital Pseudonyms; Location Privacy Protection based on Pseudonyms; Pseudonymous Auditing; Efficient Constructions of Transaction Pseudonyms; Conclusion; Towards End-to-End Secure Pervasive Communication; Approaches to Secure One-to-Many Messaging; Techniques for End-to-End Encryption; Conclusion; Summary; Novel Security Techniques; Pseudonyms with Implicit Attributes; Construction Principle; Main Primitives
Setting and Main ProtocolsParties; Registration and Generation of Transaction Pseudonyms; Authentication of Transaction Pseudonyms; Linking and Partial Re-Identification; Complete Disclosure of Pseudonyms; Hybrid Encryption Technique for Expressive Policies; Construction Principle; Main Primitives; Setting and Main Mechanisms for Hybrid Encryption; Parties; Encryption and Decryption Schemes; Management and Generation of Private Keys; Summary; Integrated Approach within Reference Scenario; Overview; Parties; Core Interactions; Design of Security Mechanisms; Basic Principles
Make Users Implicitly Addressable via AttributesProvide Pseudonymous yet Linkable Location Updates; Communication Network Model; Adversary Model; Properties of Outside Adversary; Properties of Inside Adversary; Further Types of Adversaries; System Overview; Parties and Modules; Phases; Interactions; Summary; Mechanisms; Setup; Registration; Representation of Digital Identities; Registration Process; Activation and Group Communication; Overview; Logical Messaging Policy Layer; Access Control Layer; Protocol for End-to-End Secure Messaging; Examples; Location Tracking
Bibliography Includes bibliographical references
Notes English
Title page of PDF; (IOS Press; viewed on Jan. 14, 2013)
Subject Ubiquitous computing -- Security measures
Data encryption (Computer science)
COMPUTERS -- Computer Literacy.
COMPUTERS -- Computer Science.
COMPUTERS -- Data Processing.
COMPUTERS -- Hardware -- General.
COMPUTERS -- Information Technology.
COMPUTERS -- Machine Theory.
COMPUTERS -- Reference.
Data encryption (Computer science)
Form Electronic book
Author IOS Press.
LC no. 2012951489
ISBN 9781614991571
161499157X
1614991561
9781614991564
1283920301
9781283920308